infojet
<<< <<>>
See the links below for current IT Alerts and useful user Tips/guides
US-CERT/NCAS(National Cyber Awareness System) Main Page
CERT Vulnerability Notes Database at the Carnegie Mellon University Software Engineering Institute
NATIONAL VULNERABILITY DATABASE-NIST
NVD Dashboard
CWE-Common Weakness Enumeration-Mitre
National Security Agency (NSA)-Cybersecurity
Mitre ATT&CK Framework
OWASP web app security checker
US-CERT/NCAS(National Cyber Awareness System) Main Page
CISA Cybersecurity-Combating Cybercrime
CISA Cyber Eessentials
CISA National Cyber Awareness System (NCAS)
NIST SMALL BUSINESS CYBERSECURITY CORNER
CISA - Resources for Small and Midsize Businesses (SMB)
US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)
US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)(direct)
US SBA Cybersecurity resources
FINRA cyber security
SEC cyber security
CISA main (US-CERT-computer emergency readiness team)
Ready.gov (Cyber security)
US Secret Service Cyber security investigations
FTC cyber security
FTC Cyber security for Small Business
US Dept. of Commerce, Cyber security for Small Business-10 tips
US FCC Small business cyber security
Palo Alto Networks (Enterprise Security)
PurpleSec cybersecurity
ATT Cybersecurity
PurpleSec cybersecurity
Cisco Cybersecurity
CERT Recently Published Vulnerability Notes
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
Last updated 2024-04-18T18:47:30.440271+00:00
Recent Vulnerabilities
DHS National Cyber Security Division_US Cert_National Vulnerability Database (Search form)
(1) VU#253266: Keras 2 Lambda Layers Allow Arbitrary Code Injection in TensorFlow Models
(2) VU#123335: Multiple programming languages fail to escape arguments properly in Microsoft Windows
(3) VU#155143: Linux kernel on Intel systems is susceptible to Spectre v2 attacks
(4) VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks
(5) VU#417980: Implementations of UDP-based application protocols are vulnerable to network loops
(6) VU#488902: CPU hardware utilizing speculative execution may be vulnerable to speculative race conditions
(7) VU#949046: Sceiner firmware locks and associated devices are vulnerable to encryption downgrade and arbitrary file upload attacks
(8) VU#446598: GPU kernel implementations susceptible to memory leak
(9) VU#302671: SMTP end-of-data uncertainty can be abused to spoof emails and bypass policies
(10) VU#132380: Vulnerabilities in EDK2 NetworkPkg IP stack implementation.
WordPress specific vulnerabilities in NIST NVD
Drupal specific vulnerabilities in NIST NVD
INFOJET HOME
FBI Internet Crime Complaint Center (IC3.gov)(file an Internet crime complaint Online)
US-CERT DHC Homepage
FBI
DHS(US Dept of Homeland Security)